1 // SPDX-License-Identifier: (GPL-2.0 OR MIT)
2 /*
3 * Driver for Microsemi VSC85xx PHYs - MACsec support
4 *
5 * Author: Antoine Tenart
6 * License: Dual MIT/GPL
7 * Copyright (c) 2020 Microsemi Corporation
8 */
9
10 #include <linux/phy.h>
11 #include <dt-bindings/net/mscc-phy-vsc8531.h>
12
13 #include <crypto/aes.h>
14
15 #include <net/macsec.h>
16
17 #include "mscc.h"
18 #include "mscc_mac.h"
19 #include "mscc_macsec.h"
20 #include "mscc_fc_buffer.h"
21
vsc8584_macsec_phy_read(struct phy_device * phydev,enum macsec_bank bank,u32 reg)22 static u32 vsc8584_macsec_phy_read(struct phy_device *phydev,
23 enum macsec_bank bank, u32 reg)
24 {
25 u32 val, val_l = 0, val_h = 0;
26 unsigned long deadline;
27 int rc;
28
29 rc = phy_select_page(phydev, MSCC_PHY_PAGE_MACSEC);
30 if (rc < 0)
31 goto failed;
32
33 __phy_write(phydev, MSCC_EXT_PAGE_MACSEC_20,
34 MSCC_PHY_MACSEC_20_TARGET(bank >> 2));
35
36 if (bank >> 2 == 0x1)
37 /* non-MACsec access */
38 bank &= 0x3;
39 else
40 bank = 0;
41
42 __phy_write(phydev, MSCC_EXT_PAGE_MACSEC_19,
43 MSCC_PHY_MACSEC_19_CMD | MSCC_PHY_MACSEC_19_READ |
44 MSCC_PHY_MACSEC_19_REG_ADDR(reg) |
45 MSCC_PHY_MACSEC_19_TARGET(bank));
46
47 deadline = jiffies + msecs_to_jiffies(PROC_CMD_NCOMPLETED_TIMEOUT_MS);
48 do {
49 val = __phy_read(phydev, MSCC_EXT_PAGE_MACSEC_19);
50 } while (time_before(jiffies, deadline) && !(val & MSCC_PHY_MACSEC_19_CMD));
51
52 val_l = __phy_read(phydev, MSCC_EXT_PAGE_MACSEC_17);
53 val_h = __phy_read(phydev, MSCC_EXT_PAGE_MACSEC_18);
54
55 failed:
56 phy_restore_page(phydev, rc, rc);
57
58 return (val_h << 16) | val_l;
59 }
60
vsc8584_macsec_phy_write(struct phy_device * phydev,enum macsec_bank bank,u32 reg,u32 val)61 static void vsc8584_macsec_phy_write(struct phy_device *phydev,
62 enum macsec_bank bank, u32 reg, u32 val)
63 {
64 unsigned long deadline;
65 int rc;
66
67 rc = phy_select_page(phydev, MSCC_PHY_PAGE_MACSEC);
68 if (rc < 0)
69 goto failed;
70
71 __phy_write(phydev, MSCC_EXT_PAGE_MACSEC_20,
72 MSCC_PHY_MACSEC_20_TARGET(bank >> 2));
73
74 if ((bank >> 2 == 0x1) || (bank >> 2 == 0x3))
75 bank &= 0x3;
76 else
77 /* MACsec access */
78 bank = 0;
79
80 __phy_write(phydev, MSCC_EXT_PAGE_MACSEC_17, (u16)val);
81 __phy_write(phydev, MSCC_EXT_PAGE_MACSEC_18, (u16)(val >> 16));
82
83 __phy_write(phydev, MSCC_EXT_PAGE_MACSEC_19,
84 MSCC_PHY_MACSEC_19_CMD | MSCC_PHY_MACSEC_19_REG_ADDR(reg) |
85 MSCC_PHY_MACSEC_19_TARGET(bank));
86
87 deadline = jiffies + msecs_to_jiffies(PROC_CMD_NCOMPLETED_TIMEOUT_MS);
88 do {
89 val = __phy_read(phydev, MSCC_EXT_PAGE_MACSEC_19);
90 } while (time_before(jiffies, deadline) && !(val & MSCC_PHY_MACSEC_19_CMD));
91
92 failed:
93 phy_restore_page(phydev, rc, rc);
94 }
95
vsc8584_macsec_classification(struct phy_device * phydev,enum macsec_bank bank)96 static void vsc8584_macsec_classification(struct phy_device *phydev,
97 enum macsec_bank bank)
98 {
99 /* enable VLAN tag parsing */
100 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_SAM_CP_TAG,
101 MSCC_MS_SAM_CP_TAG_PARSE_STAG |
102 MSCC_MS_SAM_CP_TAG_PARSE_QTAG |
103 MSCC_MS_SAM_CP_TAG_PARSE_QINQ);
104 }
105
vsc8584_macsec_flow_default_action(struct phy_device * phydev,enum macsec_bank bank,bool block)106 static void vsc8584_macsec_flow_default_action(struct phy_device *phydev,
107 enum macsec_bank bank,
108 bool block)
109 {
110 u32 port = (bank == MACSEC_INGR) ?
111 MSCC_MS_PORT_UNCONTROLLED : MSCC_MS_PORT_COMMON;
112 u32 action = MSCC_MS_FLOW_BYPASS;
113
114 if (block)
115 action = MSCC_MS_FLOW_DROP;
116
117 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_SAM_NM_FLOW_NCP,
118 /* MACsec untagged */
119 MSCC_MS_SAM_NM_FLOW_NCP_UNTAGGED_FLOW_TYPE(action) |
120 MSCC_MS_SAM_NM_FLOW_NCP_UNTAGGED_DROP_ACTION(MSCC_MS_ACTION_DROP) |
121 MSCC_MS_SAM_NM_FLOW_NCP_UNTAGGED_DEST_PORT(port) |
122 /* MACsec tagged */
123 MSCC_MS_SAM_NM_FLOW_NCP_TAGGED_FLOW_TYPE(action) |
124 MSCC_MS_SAM_NM_FLOW_NCP_TAGGED_DROP_ACTION(MSCC_MS_ACTION_DROP) |
125 MSCC_MS_SAM_NM_FLOW_NCP_TAGGED_DEST_PORT(port) |
126 /* Bad tag */
127 MSCC_MS_SAM_NM_FLOW_NCP_BADTAG_FLOW_TYPE(action) |
128 MSCC_MS_SAM_NM_FLOW_NCP_BADTAG_DROP_ACTION(MSCC_MS_ACTION_DROP) |
129 MSCC_MS_SAM_NM_FLOW_NCP_BADTAG_DEST_PORT(port) |
130 /* Kay tag */
131 MSCC_MS_SAM_NM_FLOW_NCP_KAY_FLOW_TYPE(action) |
132 MSCC_MS_SAM_NM_FLOW_NCP_KAY_DROP_ACTION(MSCC_MS_ACTION_DROP) |
133 MSCC_MS_SAM_NM_FLOW_NCP_KAY_DEST_PORT(port));
134 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_SAM_NM_FLOW_CP,
135 /* MACsec untagged */
136 MSCC_MS_SAM_NM_FLOW_NCP_UNTAGGED_FLOW_TYPE(action) |
137 MSCC_MS_SAM_NM_FLOW_CP_UNTAGGED_DROP_ACTION(MSCC_MS_ACTION_DROP) |
138 MSCC_MS_SAM_NM_FLOW_CP_UNTAGGED_DEST_PORT(port) |
139 /* MACsec tagged */
140 MSCC_MS_SAM_NM_FLOW_NCP_TAGGED_FLOW_TYPE(action) |
141 MSCC_MS_SAM_NM_FLOW_CP_TAGGED_DROP_ACTION(MSCC_MS_ACTION_DROP) |
142 MSCC_MS_SAM_NM_FLOW_CP_TAGGED_DEST_PORT(port) |
143 /* Bad tag */
144 MSCC_MS_SAM_NM_FLOW_NCP_BADTAG_FLOW_TYPE(action) |
145 MSCC_MS_SAM_NM_FLOW_CP_BADTAG_DROP_ACTION(MSCC_MS_ACTION_DROP) |
146 MSCC_MS_SAM_NM_FLOW_CP_BADTAG_DEST_PORT(port) |
147 /* Kay tag */
148 MSCC_MS_SAM_NM_FLOW_NCP_KAY_FLOW_TYPE(action) |
149 MSCC_MS_SAM_NM_FLOW_CP_KAY_DROP_ACTION(MSCC_MS_ACTION_DROP) |
150 MSCC_MS_SAM_NM_FLOW_CP_KAY_DEST_PORT(port));
151 }
152
vsc8584_macsec_integrity_checks(struct phy_device * phydev,enum macsec_bank bank)153 static void vsc8584_macsec_integrity_checks(struct phy_device *phydev,
154 enum macsec_bank bank)
155 {
156 u32 val;
157
158 if (bank != MACSEC_INGR)
159 return;
160
161 /* Set default rules to pass unmatched frames */
162 val = vsc8584_macsec_phy_read(phydev, bank,
163 MSCC_MS_PARAMS2_IG_CC_CONTROL);
164 val |= MSCC_MS_PARAMS2_IG_CC_CONTROL_NON_MATCH_CTRL_ACT |
165 MSCC_MS_PARAMS2_IG_CC_CONTROL_NON_MATCH_ACT;
166 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_PARAMS2_IG_CC_CONTROL,
167 val);
168
169 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_PARAMS2_IG_CP_TAG,
170 MSCC_MS_PARAMS2_IG_CP_TAG_PARSE_STAG |
171 MSCC_MS_PARAMS2_IG_CP_TAG_PARSE_QTAG |
172 MSCC_MS_PARAMS2_IG_CP_TAG_PARSE_QINQ);
173 }
174
vsc8584_macsec_block_init(struct phy_device * phydev,enum macsec_bank bank)175 static void vsc8584_macsec_block_init(struct phy_device *phydev,
176 enum macsec_bank bank)
177 {
178 u32 val;
179 int i;
180
181 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_ENA_CFG,
182 MSCC_MS_ENA_CFG_SW_RST |
183 MSCC_MS_ENA_CFG_MACSEC_BYPASS_ENA);
184
185 /* Set the MACsec block out of s/w reset and enable clocks */
186 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_ENA_CFG,
187 MSCC_MS_ENA_CFG_CLK_ENA);
188
189 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_STATUS_CONTEXT_CTRL,
190 bank == MACSEC_INGR ? 0xe5880214 : 0xe5880218);
191 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_MISC_CONTROL,
192 MSCC_MS_MISC_CONTROL_MC_LATENCY_FIX(bank == MACSEC_INGR ? 57 : 40) |
193 MSCC_MS_MISC_CONTROL_XFORM_REC_SIZE(bank == MACSEC_INGR ? 1 : 2));
194
195 /* Clear the counters */
196 val = vsc8584_macsec_phy_read(phydev, bank, MSCC_MS_COUNT_CONTROL);
197 val |= MSCC_MS_COUNT_CONTROL_AUTO_CNTR_RESET;
198 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_COUNT_CONTROL, val);
199
200 /* Enable octet increment mode */
201 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_PP_CTRL,
202 MSCC_MS_PP_CTRL_MACSEC_OCTET_INCR_MODE);
203
204 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_BLOCK_CTX_UPDATE, 0x3);
205
206 val = vsc8584_macsec_phy_read(phydev, bank, MSCC_MS_COUNT_CONTROL);
207 val |= MSCC_MS_COUNT_CONTROL_RESET_ALL;
208 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_COUNT_CONTROL, val);
209
210 /* Set the MTU */
211 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_NON_VLAN_MTU_CHECK,
212 MSCC_MS_NON_VLAN_MTU_CHECK_NV_MTU_COMPARE(32761) |
213 MSCC_MS_NON_VLAN_MTU_CHECK_NV_MTU_COMP_DROP);
214
215 for (i = 0; i < 8; i++)
216 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_VLAN_MTU_CHECK(i),
217 MSCC_MS_VLAN_MTU_CHECK_MTU_COMPARE(32761) |
218 MSCC_MS_VLAN_MTU_CHECK_MTU_COMP_DROP);
219
220 if (bank == MACSEC_EGR) {
221 val = vsc8584_macsec_phy_read(phydev, bank, MSCC_MS_INTR_CTRL_STATUS);
222 val &= ~MSCC_MS_INTR_CTRL_STATUS_INTR_ENABLE_M;
223 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_INTR_CTRL_STATUS, val);
224
225 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_FC_CFG,
226 MSCC_MS_FC_CFG_FCBUF_ENA |
227 MSCC_MS_FC_CFG_LOW_THRESH(0x1) |
228 MSCC_MS_FC_CFG_HIGH_THRESH(0x4) |
229 MSCC_MS_FC_CFG_LOW_BYTES_VAL(0x4) |
230 MSCC_MS_FC_CFG_HIGH_BYTES_VAL(0x6));
231 }
232
233 vsc8584_macsec_classification(phydev, bank);
234 vsc8584_macsec_flow_default_action(phydev, bank, false);
235 vsc8584_macsec_integrity_checks(phydev, bank);
236
237 /* Enable the MACsec block */
238 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_ENA_CFG,
239 MSCC_MS_ENA_CFG_CLK_ENA |
240 MSCC_MS_ENA_CFG_MACSEC_ENA |
241 MSCC_MS_ENA_CFG_MACSEC_SPEED_MODE(0x5));
242 }
243
vsc8584_macsec_mac_init(struct phy_device * phydev,enum macsec_bank bank)244 static void vsc8584_macsec_mac_init(struct phy_device *phydev,
245 enum macsec_bank bank)
246 {
247 u32 val;
248 int i;
249
250 /* Clear host & line stats */
251 for (i = 0; i < 36; i++)
252 vsc8584_macsec_phy_write(phydev, bank, 0x1c + i, 0);
253
254 val = vsc8584_macsec_phy_read(phydev, bank,
255 MSCC_MAC_PAUSE_CFG_TX_FRAME_CTRL);
256 val &= ~MSCC_MAC_PAUSE_CFG_TX_FRAME_CTRL_PAUSE_MODE_M;
257 val |= MSCC_MAC_PAUSE_CFG_TX_FRAME_CTRL_PAUSE_MODE(2) |
258 MSCC_MAC_PAUSE_CFG_TX_FRAME_CTRL_PAUSE_VALUE(0xffff);
259 vsc8584_macsec_phy_write(phydev, bank,
260 MSCC_MAC_PAUSE_CFG_TX_FRAME_CTRL, val);
261
262 val = vsc8584_macsec_phy_read(phydev, bank,
263 MSCC_MAC_PAUSE_CFG_TX_FRAME_CTRL_2);
264 val |= 0xffff;
265 vsc8584_macsec_phy_write(phydev, bank,
266 MSCC_MAC_PAUSE_CFG_TX_FRAME_CTRL_2, val);
267
268 val = vsc8584_macsec_phy_read(phydev, bank,
269 MSCC_MAC_PAUSE_CFG_RX_FRAME_CTRL);
270 if (bank == HOST_MAC)
271 val |= MSCC_MAC_PAUSE_CFG_RX_FRAME_CTRL_PAUSE_TIMER_ENA |
272 MSCC_MAC_PAUSE_CFG_RX_FRAME_CTRL_PAUSE_FRAME_DROP_ENA;
273 else
274 val |= MSCC_MAC_PAUSE_CFG_RX_FRAME_CTRL_PAUSE_REACT_ENA |
275 MSCC_MAC_PAUSE_CFG_RX_FRAME_CTRL_PAUSE_FRAME_DROP_ENA |
276 MSCC_MAC_PAUSE_CFG_RX_FRAME_CTRL_PAUSE_MODE |
277 MSCC_MAC_PAUSE_CFG_RX_FRAME_CTRL_EARLY_PAUSE_DETECT_ENA;
278 vsc8584_macsec_phy_write(phydev, bank,
279 MSCC_MAC_PAUSE_CFG_RX_FRAME_CTRL, val);
280
281 vsc8584_macsec_phy_write(phydev, bank, MSCC_MAC_CFG_PKTINF_CFG,
282 MSCC_MAC_CFG_PKTINF_CFG_STRIP_FCS_ENA |
283 MSCC_MAC_CFG_PKTINF_CFG_INSERT_FCS_ENA |
284 MSCC_MAC_CFG_PKTINF_CFG_LPI_RELAY_ENA |
285 MSCC_MAC_CFG_PKTINF_CFG_STRIP_PREAMBLE_ENA |
286 MSCC_MAC_CFG_PKTINF_CFG_INSERT_PREAMBLE_ENA |
287 (bank == HOST_MAC ?
288 MSCC_MAC_CFG_PKTINF_CFG_ENABLE_TX_PADDING : 0) |
289 (IS_ENABLED(CONFIG_NETWORK_PHY_TIMESTAMPING) ?
290 MSCC_MAC_CFG_PKTINF_CFG_MACSEC_BYPASS_NUM_PTP_STALL_CLKS(0x8) : 0));
291
292 val = vsc8584_macsec_phy_read(phydev, bank, MSCC_MAC_CFG_MODE_CFG);
293 val &= ~MSCC_MAC_CFG_MODE_CFG_DISABLE_DIC;
294 vsc8584_macsec_phy_write(phydev, bank, MSCC_MAC_CFG_MODE_CFG, val);
295
296 val = vsc8584_macsec_phy_read(phydev, bank, MSCC_MAC_CFG_MAXLEN_CFG);
297 val &= ~MSCC_MAC_CFG_MAXLEN_CFG_MAX_LEN_M;
298 val |= MSCC_MAC_CFG_MAXLEN_CFG_MAX_LEN(10240);
299 vsc8584_macsec_phy_write(phydev, bank, MSCC_MAC_CFG_MAXLEN_CFG, val);
300
301 vsc8584_macsec_phy_write(phydev, bank, MSCC_MAC_CFG_ADV_CHK_CFG,
302 MSCC_MAC_CFG_ADV_CHK_CFG_SFD_CHK_ENA |
303 MSCC_MAC_CFG_ADV_CHK_CFG_PRM_CHK_ENA |
304 MSCC_MAC_CFG_ADV_CHK_CFG_OOR_ERR_ENA |
305 MSCC_MAC_CFG_ADV_CHK_CFG_INR_ERR_ENA);
306
307 val = vsc8584_macsec_phy_read(phydev, bank, MSCC_MAC_CFG_LFS_CFG);
308 val &= ~MSCC_MAC_CFG_LFS_CFG_LFS_MODE_ENA;
309 vsc8584_macsec_phy_write(phydev, bank, MSCC_MAC_CFG_LFS_CFG, val);
310
311 vsc8584_macsec_phy_write(phydev, bank, MSCC_MAC_CFG_ENA_CFG,
312 MSCC_MAC_CFG_ENA_CFG_RX_CLK_ENA |
313 MSCC_MAC_CFG_ENA_CFG_TX_CLK_ENA |
314 MSCC_MAC_CFG_ENA_CFG_RX_ENA |
315 MSCC_MAC_CFG_ENA_CFG_TX_ENA);
316 }
317
318 /* Must be called with mdio_lock taken */
__vsc8584_macsec_init(struct phy_device * phydev)319 static int __vsc8584_macsec_init(struct phy_device *phydev)
320 {
321 struct vsc8531_private *priv = phydev->priv;
322 enum macsec_bank proc_bank;
323 u32 val;
324
325 vsc8584_macsec_block_init(phydev, MACSEC_INGR);
326 vsc8584_macsec_block_init(phydev, MACSEC_EGR);
327 vsc8584_macsec_mac_init(phydev, HOST_MAC);
328 vsc8584_macsec_mac_init(phydev, LINE_MAC);
329
330 vsc8584_macsec_phy_write(phydev, FC_BUFFER,
331 MSCC_FCBUF_FC_READ_THRESH_CFG,
332 MSCC_FCBUF_FC_READ_THRESH_CFG_TX_THRESH(4) |
333 MSCC_FCBUF_FC_READ_THRESH_CFG_RX_THRESH(5));
334
335 val = vsc8584_macsec_phy_read(phydev, FC_BUFFER, MSCC_FCBUF_MODE_CFG);
336 val |= MSCC_FCBUF_MODE_CFG_PAUSE_GEN_ENA |
337 MSCC_FCBUF_MODE_CFG_RX_PPM_RATE_ADAPT_ENA |
338 MSCC_FCBUF_MODE_CFG_TX_PPM_RATE_ADAPT_ENA;
339 vsc8584_macsec_phy_write(phydev, FC_BUFFER, MSCC_FCBUF_MODE_CFG, val);
340
341 vsc8584_macsec_phy_write(phydev, FC_BUFFER, MSCC_FCBUF_PPM_RATE_ADAPT_THRESH_CFG,
342 MSCC_FCBUF_PPM_RATE_ADAPT_THRESH_CFG_TX_THRESH(8) |
343 MSCC_FCBUF_PPM_RATE_ADAPT_THRESH_CFG_TX_OFFSET(9));
344
345 val = vsc8584_macsec_phy_read(phydev, FC_BUFFER,
346 MSCC_FCBUF_TX_DATA_QUEUE_CFG);
347 val &= ~(MSCC_FCBUF_TX_DATA_QUEUE_CFG_START_M |
348 MSCC_FCBUF_TX_DATA_QUEUE_CFG_END_M);
349 val |= MSCC_FCBUF_TX_DATA_QUEUE_CFG_START(0) |
350 MSCC_FCBUF_TX_DATA_QUEUE_CFG_END(5119);
351 vsc8584_macsec_phy_write(phydev, FC_BUFFER,
352 MSCC_FCBUF_TX_DATA_QUEUE_CFG, val);
353
354 val = vsc8584_macsec_phy_read(phydev, FC_BUFFER, MSCC_FCBUF_ENA_CFG);
355 val |= MSCC_FCBUF_ENA_CFG_TX_ENA | MSCC_FCBUF_ENA_CFG_RX_ENA;
356 vsc8584_macsec_phy_write(phydev, FC_BUFFER, MSCC_FCBUF_ENA_CFG, val);
357
358 proc_bank = (priv->addr < 2) ? PROC_0 : PROC_2;
359
360 val = vsc8584_macsec_phy_read(phydev, proc_bank,
361 MSCC_PROC_IP_1588_TOP_CFG_STAT_MODE_CTL);
362 val &= ~MSCC_PROC_IP_1588_TOP_CFG_STAT_MODE_CTL_PROTOCOL_MODE_M;
363 val |= MSCC_PROC_IP_1588_TOP_CFG_STAT_MODE_CTL_PROTOCOL_MODE(4);
364 vsc8584_macsec_phy_write(phydev, proc_bank,
365 MSCC_PROC_IP_1588_TOP_CFG_STAT_MODE_CTL, val);
366
367 return 0;
368 }
369
vsc8584_macsec_flow(struct phy_device * phydev,struct macsec_flow * flow)370 static void vsc8584_macsec_flow(struct phy_device *phydev,
371 struct macsec_flow *flow)
372 {
373 struct vsc8531_private *priv = phydev->priv;
374 enum macsec_bank bank = flow->bank;
375 u32 val, match = 0, mask = 0, action = 0, idx = flow->index;
376
377 if (flow->match.tagged)
378 match |= MSCC_MS_SAM_MISC_MATCH_TAGGED;
379 if (flow->match.untagged)
380 match |= MSCC_MS_SAM_MISC_MATCH_UNTAGGED;
381
382 if (bank == MACSEC_INGR && flow->assoc_num >= 0) {
383 match |= MSCC_MS_SAM_MISC_MATCH_AN(flow->assoc_num);
384 mask |= MSCC_MS_SAM_MASK_AN_MASK(0x3);
385 }
386
387 if (bank == MACSEC_INGR && flow->match.sci && flow->rx_sa->sc->sci) {
388 u64 sci = (__force u64)flow->rx_sa->sc->sci;
389
390 match |= MSCC_MS_SAM_MISC_MATCH_TCI(BIT(3));
391 mask |= MSCC_MS_SAM_MASK_TCI_MASK(BIT(3)) |
392 MSCC_MS_SAM_MASK_SCI_MASK;
393
394 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_SAM_MATCH_SCI_LO(idx),
395 lower_32_bits(sci));
396 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_SAM_MATCH_SCI_HI(idx),
397 upper_32_bits(sci));
398 }
399
400 if (flow->match.etype) {
401 mask |= MSCC_MS_SAM_MASK_MAC_ETYPE_MASK;
402
403 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_SAM_MAC_SA_MATCH_HI(idx),
404 MSCC_MS_SAM_MAC_SA_MATCH_HI_ETYPE((__force u32)htons(flow->etype)));
405 }
406
407 match |= MSCC_MS_SAM_MISC_MATCH_PRIORITY(flow->priority);
408
409 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_SAM_MISC_MATCH(idx), match);
410 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_SAM_MASK(idx), mask);
411
412 /* Action for matching packets */
413 if (flow->action.drop)
414 action = MSCC_MS_FLOW_DROP;
415 else if (flow->action.bypass || flow->port == MSCC_MS_PORT_UNCONTROLLED)
416 action = MSCC_MS_FLOW_BYPASS;
417 else
418 action = (bank == MACSEC_INGR) ?
419 MSCC_MS_FLOW_INGRESS : MSCC_MS_FLOW_EGRESS;
420
421 val = MSCC_MS_SAM_FLOW_CTRL_FLOW_TYPE(action) |
422 MSCC_MS_SAM_FLOW_CTRL_DROP_ACTION(MSCC_MS_ACTION_DROP) |
423 MSCC_MS_SAM_FLOW_CTRL_DEST_PORT(flow->port);
424
425 if (action == MSCC_MS_FLOW_BYPASS)
426 goto write_ctrl;
427
428 if (bank == MACSEC_INGR) {
429 if (priv->secy->replay_protect)
430 val |= MSCC_MS_SAM_FLOW_CTRL_REPLAY_PROTECT;
431 if (priv->secy->validate_frames == MACSEC_VALIDATE_STRICT)
432 val |= MSCC_MS_SAM_FLOW_CTRL_VALIDATE_FRAMES(MSCC_MS_VALIDATE_STRICT);
433 else if (priv->secy->validate_frames == MACSEC_VALIDATE_CHECK)
434 val |= MSCC_MS_SAM_FLOW_CTRL_VALIDATE_FRAMES(MSCC_MS_VALIDATE_CHECK);
435 } else if (bank == MACSEC_EGR) {
436 if (priv->secy->protect_frames)
437 val |= MSCC_MS_SAM_FLOW_CTRL_PROTECT_FRAME;
438 if (priv->secy->tx_sc.encrypt)
439 val |= MSCC_MS_SAM_FLOW_CTRL_CONF_PROTECT;
440 if (priv->secy->tx_sc.send_sci)
441 val |= MSCC_MS_SAM_FLOW_CTRL_INCLUDE_SCI;
442 }
443
444 write_ctrl:
445 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_SAM_FLOW_CTRL(idx), val);
446 }
447
vsc8584_macsec_find_flow(struct macsec_context * ctx,enum macsec_bank bank)448 static struct macsec_flow *vsc8584_macsec_find_flow(struct macsec_context *ctx,
449 enum macsec_bank bank)
450 {
451 struct vsc8531_private *priv = ctx->phydev->priv;
452 struct macsec_flow *pos, *tmp;
453
454 list_for_each_entry_safe(pos, tmp, &priv->macsec_flows, list)
455 if (pos->assoc_num == ctx->sa.assoc_num && pos->bank == bank)
456 return pos;
457
458 return ERR_PTR(-ENOENT);
459 }
460
vsc8584_macsec_flow_enable(struct phy_device * phydev,struct macsec_flow * flow)461 static void vsc8584_macsec_flow_enable(struct phy_device *phydev,
462 struct macsec_flow *flow)
463 {
464 enum macsec_bank bank = flow->bank;
465 u32 val, idx = flow->index;
466
467 if ((flow->bank == MACSEC_INGR && flow->rx_sa && !flow->rx_sa->active) ||
468 (flow->bank == MACSEC_EGR && flow->tx_sa && !flow->tx_sa->active))
469 return;
470
471 /* Enable */
472 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_SAM_ENTRY_SET1, BIT(idx));
473
474 /* Set in-use */
475 val = vsc8584_macsec_phy_read(phydev, bank, MSCC_MS_SAM_FLOW_CTRL(idx));
476 val |= MSCC_MS_SAM_FLOW_CTRL_SA_IN_USE;
477 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_SAM_FLOW_CTRL(idx), val);
478 }
479
vsc8584_macsec_flow_disable(struct phy_device * phydev,struct macsec_flow * flow)480 static void vsc8584_macsec_flow_disable(struct phy_device *phydev,
481 struct macsec_flow *flow)
482 {
483 enum macsec_bank bank = flow->bank;
484 u32 val, idx = flow->index;
485
486 /* Disable */
487 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_SAM_ENTRY_CLEAR1, BIT(idx));
488
489 /* Clear in-use */
490 val = vsc8584_macsec_phy_read(phydev, bank, MSCC_MS_SAM_FLOW_CTRL(idx));
491 val &= ~MSCC_MS_SAM_FLOW_CTRL_SA_IN_USE;
492 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_SAM_FLOW_CTRL(idx), val);
493 }
494
vsc8584_macsec_flow_context_id(struct macsec_flow * flow)495 static u32 vsc8584_macsec_flow_context_id(struct macsec_flow *flow)
496 {
497 if (flow->bank == MACSEC_INGR)
498 return flow->index + MSCC_MS_MAX_FLOWS;
499
500 return flow->index;
501 }
502
503 /* Derive the AES key to get a key for the hash autentication */
vsc8584_macsec_derive_key(const u8 key[MACSEC_MAX_KEY_LEN],u16 key_len,u8 hkey[16])504 static int vsc8584_macsec_derive_key(const u8 key[MACSEC_MAX_KEY_LEN],
505 u16 key_len, u8 hkey[16])
506 {
507 const u8 input[AES_BLOCK_SIZE] = {0};
508 struct crypto_aes_ctx ctx;
509 int ret;
510
511 ret = aes_expandkey(&ctx, key, key_len);
512 if (ret)
513 return ret;
514
515 aes_encrypt(&ctx, hkey, input);
516 memzero_explicit(&ctx, sizeof(ctx));
517 return 0;
518 }
519
vsc8584_macsec_transformation(struct phy_device * phydev,struct macsec_flow * flow)520 static int vsc8584_macsec_transformation(struct phy_device *phydev,
521 struct macsec_flow *flow)
522 {
523 struct vsc8531_private *priv = phydev->priv;
524 enum macsec_bank bank = flow->bank;
525 int i, ret, index = flow->index;
526 u32 rec = 0, control = 0;
527 u8 hkey[16];
528 u64 sci;
529
530 ret = vsc8584_macsec_derive_key(flow->key, priv->secy->key_len, hkey);
531 if (ret)
532 return ret;
533
534 switch (priv->secy->key_len) {
535 case 16:
536 control |= CONTROL_CRYPTO_ALG(CTRYPTO_ALG_AES_CTR_128);
537 break;
538 case 32:
539 control |= CONTROL_CRYPTO_ALG(CTRYPTO_ALG_AES_CTR_256);
540 break;
541 default:
542 return -EINVAL;
543 }
544
545 control |= (bank == MACSEC_EGR) ?
546 (CONTROL_TYPE_EGRESS | CONTROL_AN(priv->secy->tx_sc.encoding_sa)) :
547 (CONTROL_TYPE_INGRESS | CONTROL_SEQ_MASK);
548
549 control |= CONTROL_UPDATE_SEQ | CONTROL_ENCRYPT_AUTH | CONTROL_KEY_IN_CTX |
550 CONTROL_IV0 | CONTROL_IV1 | CONTROL_IV_IN_SEQ |
551 CONTROL_DIGEST_TYPE(0x2) | CONTROL_SEQ_TYPE(0x1) |
552 CONTROL_AUTH_ALG(AUTH_ALG_AES_GHAS) | CONTROL_CONTEXT_ID;
553
554 /* Set the control word */
555 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_XFORM_REC(index, rec++),
556 control);
557
558 /* Set the context ID. Must be unique. */
559 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_XFORM_REC(index, rec++),
560 vsc8584_macsec_flow_context_id(flow));
561
562 /* Set the encryption/decryption key */
563 for (i = 0; i < priv->secy->key_len / sizeof(u32); i++)
564 vsc8584_macsec_phy_write(phydev, bank,
565 MSCC_MS_XFORM_REC(index, rec++),
566 ((u32 *)flow->key)[i]);
567
568 /* Set the authentication key */
569 for (i = 0; i < 4; i++)
570 vsc8584_macsec_phy_write(phydev, bank,
571 MSCC_MS_XFORM_REC(index, rec++),
572 ((u32 *)hkey)[i]);
573
574 /* Initial sequence number */
575 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_XFORM_REC(index, rec++),
576 bank == MACSEC_INGR ?
577 flow->rx_sa->next_pn : flow->tx_sa->next_pn);
578
579 if (bank == MACSEC_INGR)
580 /* Set the mask (replay window size) */
581 vsc8584_macsec_phy_write(phydev, bank,
582 MSCC_MS_XFORM_REC(index, rec++),
583 priv->secy->replay_window);
584
585 /* Set the input vectors */
586 sci = (__force u64)(bank == MACSEC_INGR ? flow->rx_sa->sc->sci : priv->secy->sci);
587 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_XFORM_REC(index, rec++),
588 lower_32_bits(sci));
589 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_XFORM_REC(index, rec++),
590 upper_32_bits(sci));
591
592 while (rec < 20)
593 vsc8584_macsec_phy_write(phydev, bank, MSCC_MS_XFORM_REC(index, rec++),
594 0);
595
596 flow->has_transformation = true;
597 return 0;
598 }
599
vsc8584_macsec_alloc_flow(struct vsc8531_private * priv,enum macsec_bank bank)600 static struct macsec_flow *vsc8584_macsec_alloc_flow(struct vsc8531_private *priv,
601 enum macsec_bank bank)
602 {
603 unsigned long *bitmap = bank == MACSEC_INGR ?
604 &priv->ingr_flows : &priv->egr_flows;
605 struct macsec_flow *flow;
606 int index;
607
608 index = find_first_zero_bit(bitmap, MSCC_MS_MAX_FLOWS);
609
610 if (index == MSCC_MS_MAX_FLOWS)
611 return ERR_PTR(-ENOMEM);
612
613 flow = kzalloc(sizeof(*flow), GFP_KERNEL);
614 if (!flow)
615 return ERR_PTR(-ENOMEM);
616
617 set_bit(index, bitmap);
618 flow->index = index;
619 flow->bank = bank;
620 flow->priority = 8;
621 flow->assoc_num = -1;
622
623 list_add_tail(&flow->list, &priv->macsec_flows);
624 return flow;
625 }
626
vsc8584_macsec_free_flow(struct vsc8531_private * priv,struct macsec_flow * flow)627 static void vsc8584_macsec_free_flow(struct vsc8531_private *priv,
628 struct macsec_flow *flow)
629 {
630 unsigned long *bitmap = flow->bank == MACSEC_INGR ?
631 &priv->ingr_flows : &priv->egr_flows;
632
633 list_del(&flow->list);
634 clear_bit(flow->index, bitmap);
635 memzero_explicit(flow->key, sizeof(flow->key));
636 kfree(flow);
637 }
638
vsc8584_macsec_add_flow(struct phy_device * phydev,struct macsec_flow * flow,bool update)639 static int vsc8584_macsec_add_flow(struct phy_device *phydev,
640 struct macsec_flow *flow, bool update)
641 {
642 int ret;
643
644 flow->port = MSCC_MS_PORT_CONTROLLED;
645 vsc8584_macsec_flow(phydev, flow);
646
647 if (update)
648 return 0;
649
650 ret = vsc8584_macsec_transformation(phydev, flow);
651 if (ret) {
652 vsc8584_macsec_free_flow(phydev->priv, flow);
653 return ret;
654 }
655
656 return 0;
657 }
658
vsc8584_macsec_default_flows(struct phy_device * phydev)659 static int vsc8584_macsec_default_flows(struct phy_device *phydev)
660 {
661 struct macsec_flow *flow;
662
663 /* Add a rule to let the MKA traffic go through, ingress */
664 flow = vsc8584_macsec_alloc_flow(phydev->priv, MACSEC_INGR);
665 if (IS_ERR(flow))
666 return PTR_ERR(flow);
667
668 flow->priority = 15;
669 flow->port = MSCC_MS_PORT_UNCONTROLLED;
670 flow->match.tagged = 1;
671 flow->match.untagged = 1;
672 flow->match.etype = 1;
673 flow->etype = ETH_P_PAE;
674 flow->action.bypass = 1;
675
676 vsc8584_macsec_flow(phydev, flow);
677 vsc8584_macsec_flow_enable(phydev, flow);
678
679 /* Add a rule to let the MKA traffic go through, egress */
680 flow = vsc8584_macsec_alloc_flow(phydev->priv, MACSEC_EGR);
681 if (IS_ERR(flow))
682 return PTR_ERR(flow);
683
684 flow->priority = 15;
685 flow->port = MSCC_MS_PORT_COMMON;
686 flow->match.untagged = 1;
687 flow->match.etype = 1;
688 flow->etype = ETH_P_PAE;
689 flow->action.bypass = 1;
690
691 vsc8584_macsec_flow(phydev, flow);
692 vsc8584_macsec_flow_enable(phydev, flow);
693
694 return 0;
695 }
696
vsc8584_macsec_del_flow(struct phy_device * phydev,struct macsec_flow * flow)697 static void vsc8584_macsec_del_flow(struct phy_device *phydev,
698 struct macsec_flow *flow)
699 {
700 vsc8584_macsec_flow_disable(phydev, flow);
701 vsc8584_macsec_free_flow(phydev->priv, flow);
702 }
703
__vsc8584_macsec_add_rxsa(struct macsec_context * ctx,struct macsec_flow * flow,bool update)704 static int __vsc8584_macsec_add_rxsa(struct macsec_context *ctx,
705 struct macsec_flow *flow, bool update)
706 {
707 struct phy_device *phydev = ctx->phydev;
708 struct vsc8531_private *priv = phydev->priv;
709
710 if (!flow) {
711 flow = vsc8584_macsec_alloc_flow(priv, MACSEC_INGR);
712 if (IS_ERR(flow))
713 return PTR_ERR(flow);
714
715 memcpy(flow->key, ctx->sa.key, priv->secy->key_len);
716 }
717
718 flow->assoc_num = ctx->sa.assoc_num;
719 flow->rx_sa = ctx->sa.rx_sa;
720
721 /* Always match tagged packets on ingress */
722 flow->match.tagged = 1;
723 flow->match.sci = 1;
724
725 if (priv->secy->validate_frames != MACSEC_VALIDATE_DISABLED)
726 flow->match.untagged = 1;
727
728 return vsc8584_macsec_add_flow(phydev, flow, update);
729 }
730
__vsc8584_macsec_add_txsa(struct macsec_context * ctx,struct macsec_flow * flow,bool update)731 static int __vsc8584_macsec_add_txsa(struct macsec_context *ctx,
732 struct macsec_flow *flow, bool update)
733 {
734 struct phy_device *phydev = ctx->phydev;
735 struct vsc8531_private *priv = phydev->priv;
736
737 if (!flow) {
738 flow = vsc8584_macsec_alloc_flow(priv, MACSEC_EGR);
739 if (IS_ERR(flow))
740 return PTR_ERR(flow);
741
742 memcpy(flow->key, ctx->sa.key, priv->secy->key_len);
743 }
744
745 flow->assoc_num = ctx->sa.assoc_num;
746 flow->tx_sa = ctx->sa.tx_sa;
747
748 /* Always match untagged packets on egress */
749 flow->match.untagged = 1;
750
751 return vsc8584_macsec_add_flow(phydev, flow, update);
752 }
753
vsc8584_macsec_dev_open(struct macsec_context * ctx)754 static int vsc8584_macsec_dev_open(struct macsec_context *ctx)
755 {
756 struct vsc8531_private *priv = ctx->phydev->priv;
757 struct macsec_flow *flow, *tmp;
758
759 /* No operation to perform before the commit step */
760 if (ctx->prepare)
761 return 0;
762
763 list_for_each_entry_safe(flow, tmp, &priv->macsec_flows, list)
764 vsc8584_macsec_flow_enable(ctx->phydev, flow);
765
766 return 0;
767 }
768
vsc8584_macsec_dev_stop(struct macsec_context * ctx)769 static int vsc8584_macsec_dev_stop(struct macsec_context *ctx)
770 {
771 struct vsc8531_private *priv = ctx->phydev->priv;
772 struct macsec_flow *flow, *tmp;
773
774 /* No operation to perform before the commit step */
775 if (ctx->prepare)
776 return 0;
777
778 list_for_each_entry_safe(flow, tmp, &priv->macsec_flows, list)
779 vsc8584_macsec_flow_disable(ctx->phydev, flow);
780
781 return 0;
782 }
783
vsc8584_macsec_add_secy(struct macsec_context * ctx)784 static int vsc8584_macsec_add_secy(struct macsec_context *ctx)
785 {
786 struct vsc8531_private *priv = ctx->phydev->priv;
787 struct macsec_secy *secy = ctx->secy;
788
789 if (ctx->prepare) {
790 if (priv->secy)
791 return -EEXIST;
792
793 return 0;
794 }
795
796 priv->secy = secy;
797
798 vsc8584_macsec_flow_default_action(ctx->phydev, MACSEC_EGR,
799 secy->validate_frames != MACSEC_VALIDATE_DISABLED);
800 vsc8584_macsec_flow_default_action(ctx->phydev, MACSEC_INGR,
801 secy->validate_frames != MACSEC_VALIDATE_DISABLED);
802
803 return vsc8584_macsec_default_flows(ctx->phydev);
804 }
805
vsc8584_macsec_del_secy(struct macsec_context * ctx)806 static int vsc8584_macsec_del_secy(struct macsec_context *ctx)
807 {
808 struct vsc8531_private *priv = ctx->phydev->priv;
809 struct macsec_flow *flow, *tmp;
810
811 /* No operation to perform before the commit step */
812 if (ctx->prepare)
813 return 0;
814
815 list_for_each_entry_safe(flow, tmp, &priv->macsec_flows, list)
816 vsc8584_macsec_del_flow(ctx->phydev, flow);
817
818 vsc8584_macsec_flow_default_action(ctx->phydev, MACSEC_EGR, false);
819 vsc8584_macsec_flow_default_action(ctx->phydev, MACSEC_INGR, false);
820
821 priv->secy = NULL;
822 return 0;
823 }
824
vsc8584_macsec_upd_secy(struct macsec_context * ctx)825 static int vsc8584_macsec_upd_secy(struct macsec_context *ctx)
826 {
827 /* No operation to perform before the commit step */
828 if (ctx->prepare)
829 return 0;
830
831 vsc8584_macsec_del_secy(ctx);
832 return vsc8584_macsec_add_secy(ctx);
833 }
834
vsc8584_macsec_add_rxsc(struct macsec_context * ctx)835 static int vsc8584_macsec_add_rxsc(struct macsec_context *ctx)
836 {
837 /* Nothing to do */
838 return 0;
839 }
840
vsc8584_macsec_upd_rxsc(struct macsec_context * ctx)841 static int vsc8584_macsec_upd_rxsc(struct macsec_context *ctx)
842 {
843 return -EOPNOTSUPP;
844 }
845
vsc8584_macsec_del_rxsc(struct macsec_context * ctx)846 static int vsc8584_macsec_del_rxsc(struct macsec_context *ctx)
847 {
848 struct vsc8531_private *priv = ctx->phydev->priv;
849 struct macsec_flow *flow, *tmp;
850
851 /* No operation to perform before the commit step */
852 if (ctx->prepare)
853 return 0;
854
855 list_for_each_entry_safe(flow, tmp, &priv->macsec_flows, list) {
856 if (flow->bank == MACSEC_INGR && flow->rx_sa &&
857 flow->rx_sa->sc->sci == ctx->rx_sc->sci)
858 vsc8584_macsec_del_flow(ctx->phydev, flow);
859 }
860
861 return 0;
862 }
863
vsc8584_macsec_add_rxsa(struct macsec_context * ctx)864 static int vsc8584_macsec_add_rxsa(struct macsec_context *ctx)
865 {
866 struct macsec_flow *flow = NULL;
867
868 if (ctx->prepare)
869 return __vsc8584_macsec_add_rxsa(ctx, flow, false);
870
871 flow = vsc8584_macsec_find_flow(ctx, MACSEC_INGR);
872 if (IS_ERR(flow))
873 return PTR_ERR(flow);
874
875 vsc8584_macsec_flow_enable(ctx->phydev, flow);
876 return 0;
877 }
878
vsc8584_macsec_upd_rxsa(struct macsec_context * ctx)879 static int vsc8584_macsec_upd_rxsa(struct macsec_context *ctx)
880 {
881 struct macsec_flow *flow;
882
883 flow = vsc8584_macsec_find_flow(ctx, MACSEC_INGR);
884 if (IS_ERR(flow))
885 return PTR_ERR(flow);
886
887 if (ctx->prepare) {
888 /* Make sure the flow is disabled before updating it */
889 vsc8584_macsec_flow_disable(ctx->phydev, flow);
890
891 return __vsc8584_macsec_add_rxsa(ctx, flow, true);
892 }
893
894 vsc8584_macsec_flow_enable(ctx->phydev, flow);
895 return 0;
896 }
897
vsc8584_macsec_del_rxsa(struct macsec_context * ctx)898 static int vsc8584_macsec_del_rxsa(struct macsec_context *ctx)
899 {
900 struct macsec_flow *flow;
901
902 flow = vsc8584_macsec_find_flow(ctx, MACSEC_INGR);
903
904 if (IS_ERR(flow))
905 return PTR_ERR(flow);
906 if (ctx->prepare)
907 return 0;
908
909 vsc8584_macsec_del_flow(ctx->phydev, flow);
910 return 0;
911 }
912
vsc8584_macsec_add_txsa(struct macsec_context * ctx)913 static int vsc8584_macsec_add_txsa(struct macsec_context *ctx)
914 {
915 struct macsec_flow *flow = NULL;
916
917 if (ctx->prepare)
918 return __vsc8584_macsec_add_txsa(ctx, flow, false);
919
920 flow = vsc8584_macsec_find_flow(ctx, MACSEC_EGR);
921 if (IS_ERR(flow))
922 return PTR_ERR(flow);
923
924 vsc8584_macsec_flow_enable(ctx->phydev, flow);
925 return 0;
926 }
927
vsc8584_macsec_upd_txsa(struct macsec_context * ctx)928 static int vsc8584_macsec_upd_txsa(struct macsec_context *ctx)
929 {
930 struct macsec_flow *flow;
931
932 flow = vsc8584_macsec_find_flow(ctx, MACSEC_EGR);
933 if (IS_ERR(flow))
934 return PTR_ERR(flow);
935
936 if (ctx->prepare) {
937 /* Make sure the flow is disabled before updating it */
938 vsc8584_macsec_flow_disable(ctx->phydev, flow);
939
940 return __vsc8584_macsec_add_txsa(ctx, flow, true);
941 }
942
943 vsc8584_macsec_flow_enable(ctx->phydev, flow);
944 return 0;
945 }
946
vsc8584_macsec_del_txsa(struct macsec_context * ctx)947 static int vsc8584_macsec_del_txsa(struct macsec_context *ctx)
948 {
949 struct macsec_flow *flow;
950
951 flow = vsc8584_macsec_find_flow(ctx, MACSEC_EGR);
952
953 if (IS_ERR(flow))
954 return PTR_ERR(flow);
955 if (ctx->prepare)
956 return 0;
957
958 vsc8584_macsec_del_flow(ctx->phydev, flow);
959 return 0;
960 }
961
962 static const struct macsec_ops vsc8584_macsec_ops = {
963 .mdo_dev_open = vsc8584_macsec_dev_open,
964 .mdo_dev_stop = vsc8584_macsec_dev_stop,
965 .mdo_add_secy = vsc8584_macsec_add_secy,
966 .mdo_upd_secy = vsc8584_macsec_upd_secy,
967 .mdo_del_secy = vsc8584_macsec_del_secy,
968 .mdo_add_rxsc = vsc8584_macsec_add_rxsc,
969 .mdo_upd_rxsc = vsc8584_macsec_upd_rxsc,
970 .mdo_del_rxsc = vsc8584_macsec_del_rxsc,
971 .mdo_add_rxsa = vsc8584_macsec_add_rxsa,
972 .mdo_upd_rxsa = vsc8584_macsec_upd_rxsa,
973 .mdo_del_rxsa = vsc8584_macsec_del_rxsa,
974 .mdo_add_txsa = vsc8584_macsec_add_txsa,
975 .mdo_upd_txsa = vsc8584_macsec_upd_txsa,
976 .mdo_del_txsa = vsc8584_macsec_del_txsa,
977 };
978
vsc8584_macsec_init(struct phy_device * phydev)979 int vsc8584_macsec_init(struct phy_device *phydev)
980 {
981 struct vsc8531_private *vsc8531 = phydev->priv;
982
983 switch (phydev->phy_id & phydev->drv->phy_id_mask) {
984 case PHY_ID_VSC856X:
985 case PHY_ID_VSC8582:
986 case PHY_ID_VSC8584:
987 INIT_LIST_HEAD(&vsc8531->macsec_flows);
988 vsc8531->secy = NULL;
989
990 phydev->macsec_ops = &vsc8584_macsec_ops;
991
992 return __vsc8584_macsec_init(phydev);
993 }
994
995 return 0;
996 }
997
vsc8584_handle_macsec_interrupt(struct phy_device * phydev)998 void vsc8584_handle_macsec_interrupt(struct phy_device *phydev)
999 {
1000 struct vsc8531_private *priv = phydev->priv;
1001 struct macsec_flow *flow, *tmp;
1002 u32 cause, rec;
1003
1004 /* Check MACsec PN rollover */
1005 cause = vsc8584_macsec_phy_read(phydev, MACSEC_EGR,
1006 MSCC_MS_INTR_CTRL_STATUS);
1007 cause &= MSCC_MS_INTR_CTRL_STATUS_INTR_CLR_STATUS_M;
1008 if (!(cause & MACSEC_INTR_CTRL_STATUS_ROLLOVER))
1009 return;
1010
1011 rec = 6 + priv->secy->key_len / sizeof(u32);
1012 list_for_each_entry_safe(flow, tmp, &priv->macsec_flows, list) {
1013 u32 val;
1014
1015 if (flow->bank != MACSEC_EGR || !flow->has_transformation)
1016 continue;
1017
1018 val = vsc8584_macsec_phy_read(phydev, MACSEC_EGR,
1019 MSCC_MS_XFORM_REC(flow->index, rec));
1020 if (val == 0xffffffff) {
1021 vsc8584_macsec_flow_disable(phydev, flow);
1022 macsec_pn_wrapped(priv->secy, flow->tx_sa);
1023 return;
1024 }
1025 }
1026 }
1027
vsc8584_config_macsec_intr(struct phy_device * phydev)1028 void vsc8584_config_macsec_intr(struct phy_device *phydev)
1029 {
1030 phy_write(phydev, MSCC_EXT_PAGE_ACCESS, MSCC_PHY_PAGE_EXTENDED_2);
1031 phy_write(phydev, MSCC_PHY_EXTENDED_INT, MSCC_PHY_EXTENDED_INT_MS_EGR);
1032 phy_write(phydev, MSCC_EXT_PAGE_ACCESS, MSCC_PHY_PAGE_STANDARD);
1033
1034 vsc8584_macsec_phy_write(phydev, MACSEC_EGR, MSCC_MS_AIC_CTRL, 0xf);
1035 vsc8584_macsec_phy_write(phydev, MACSEC_EGR, MSCC_MS_INTR_CTRL_STATUS,
1036 MSCC_MS_INTR_CTRL_STATUS_INTR_ENABLE(MACSEC_INTR_CTRL_STATUS_ROLLOVER));
1037 }
1038